An API design flaw in WebKitGTK and WPE WebKit allows untrusted web content to unexpectedly perform IP connections, DNS lookups, and HTTP requests. Applications expect to use the
WebPage::send-request signal handler to approve or reject all network requests. However, certain types of HTTP requests bypass this signal handler.
Metrics
Affected Vendors & Products
References
History
Thu, 23 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 23 Apr 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An API design flaw in WebKitGTK and WPE WebKit allows untrusted web content to unexpectedly perform IP connections, DNS lookups, and HTTP requests. Applications expect to use the WebPage::send-request signal handler to approve or reject all network requests. However, certain types of HTTP requests bypass this signal handler. | |
| Title | Webkitgtk: authorization bypass through webpage::send-request signal handler | |
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| Weaknesses | CWE-639 | |
| CPEs | cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
| Vendors & Products |
Redhat
Redhat enterprise Linux |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-04-23T12:48:57.468Z
Reserved: 2025-11-26T19:02:26.116Z
Link: CVE-2025-66286
Updated: 2026-04-23T12:48:32.279Z
Status : Received
Published: 2026-04-23T13:16:11.007
Modified: 2026-04-23T13:16:11.007
Link: CVE-2025-66286
No data.
OpenCVE Enrichment
No data.